Cargando…

8 steps to better security : a simple cyber resilience guide for business /

"Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Crawley, Kim (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken : John Wiley & Sons, Inc., [2021]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Foreword
  • Introduction
  • Chapter 1 Step 1: Foster a Strong Security Culture
  • Kevin Mitnick, Human Hacker Extraordinaire
  • The Importance of a Strong Security Culture
  • Hackers Are the Bad Guys, Right?
  • What Is Security Culture?
  • How to Foster a Strong Security Culture
  • Security Leaders on Security Culture
  • What Makes a Good CISO?
  • The Biggest Mistakes Businesses Make When It Comes to Cybersecurity
  • The Psychological Phases of a Cybersecurity Professional
  • Chapter 2 Step 2: Build a Security Team
  • Why Step 2 Is Controversial
  • How to Hire the Right Security Team. . .the Right Way
  • Security Team Tips from Security Leaders
  • The "Culture Fit"-Yuck!
  • Cybersecurity Budgets
  • Design Your Perfect Security Team
  • Chapter 3 Step 3: Regulatory Compliance
  • What Are Data Breaches, and Why Are They Bad?
  • The Scary Truth Found in Data Breach Research
  • An Introduction to Common Data Privacy Regulations
  • The General Data Protection Regulation
  • The California Consumer Privacy Act
  • The Health Insurance Portability and Accountability Act
  • The Gramm-Leach-Bliley Act
  • Payment Card Industry Data Security Standard
  • Governance, Risk Management, and Compliance
  • More About Risk Management
  • Threat Modeling
  • Chapter 4 Step 4: Frequent Security Testing
  • What Is Security Testing?
  • Security Testing Types
  • Security Audits
  • Vulnerability Assessments Versus Penetration Testing
  • Red Team Testing
  • Bug Bounty Programs
  • What's Security Maturity?
  • The Basics of Security Audits and Vulnerability Assessments
  • Log Early, Log Often
  • Prepare for Vulnerability Assessments and Security Audits
  • A Concise Guide to Penetration Testing
  • Penetration Testing Based on Network Knowledge
  • Penetration Testing Based on Network Aspects
  • Security Leaders on Security Maturity
  • Security Testing Is Crucial
  • Chapter 5 Step 5: Security Framework Application
  • What Is Incident Response?
  • Preparation
  • Identification or Analysis
  • Containment, Mitigation, or Eradication
  • Recovery
  • Post-incident
  • Your Computer Security Incident Response Team
  • Cybersecurity Frameworks
  • NIST Cybersecurity Framework
  • ISO 27000 Cybersecurity Frameworks
  • CIS Controls
  • COBIT Cybersecurity Framework
  • Security Frameworks and Cloud Security
  • Chapter 6 Step 6: Control Your Data Assets